After Windows recently updated, I've been getting BSODs when I load Final Fantasy 14. I have an i7 9700k, 32 gigs of RAM, and a 1080Ti stock speeds. After I load the game, about 3-5 min in, I get the BSOD. I ran a check. It only happens when I load a game. I've got my own ideas as to what is happening, but figured I'd get some advice. Any ideas and tips greatly appreciated.
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffeeeb2fa90069, Virtual address for the attempted write.
Arg2: 010000084d010021, PTE contents.
Arg3: ffffd70f82a6f440, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
Page 148685 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1937
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1977
Key : Analysis.Init.CPU.mSec
Value: 561
Key : Analysis.Init.Elapsed.mSec
Value: 7474
Key : Analysis.Memory.CommitPeak.Mb
Value: 102
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: MEMORY.DMP
BUGCHECK_CODE: be
BUGCHECK_P1: ffffeeeb2fa90069
BUGCHECK_P2: 10000084d010021
BUGCHECK_P3: ffffd70f82a6f440
BUGCHECK_P4: b
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffffd70f82a6f440 -- (.trap 0xffffd70f82a6f440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffffeeeb2fa90061
rdx=ffffeea342869620 rsi=0000000000000000 rdi=0000000000000000
rip=ffffeeeb2fa5a64e rsp=ffffd70f82a6f5d0 rbp=ffffeea3428a6968
r8=0000000000000000 r9=000000000000002f r10=fffff8005d926f90
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32kbase!HMUnlockObjectWorker+0xe:
ffffeeeb
Resetting default scope
STACK_TEXT:
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
ffffd70f
0000008a
SYMBOL_NAME: win32kbase!HMUnlockObjectWorker+e
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: AV_win32kbase!HMUnlockObjectWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9e952ddc-0b7e-c566-dbb4-78c1e2cdd928}
Followup: MachineOwner
ATTEMPTED_WRITE_TO_READONLY_MEMORY (be)
An attempt was made to write to readonly memory. The guilty driver is on the
stack trace (and is typically the current instruction pointer).
When possible, the guilty driver's name (Unicode string) is printed on
the BugCheck screen and saved in KiBugCheckDriver.
Arguments:
Arg1: ffffeeeb2fa90069, Virtual address for the attempted write.
Arg2: 010000084d010021, PTE contents.
Arg3: ffffd70f82a6f440, (reserved)
Arg4: 000000000000000b, (reserved)
Debugging Details:
------------------
Page 148685 not present in the dump file. Type ".hh dbgerr004" for details
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 1937
Key : Analysis.DebugAnalysisManager
Value: Create
Key : Analysis.Elapsed.mSec
Value: 1977
Key : Analysis.Init.CPU.mSec
Value: 561
Key : Analysis.Init.Elapsed.mSec
Value: 7474
Key : Analysis.Memory.CommitPeak.Mb
Value: 102
Key : WER.OS.Branch
Value: vb_release
Key : WER.OS.Timestamp
Value: 2019-12-06T14:06:00Z
Key : WER.OS.Version
Value: 10.0.19041.1
FILE_IN_CAB: MEMORY.DMP
BUGCHECK_CODE: be
BUGCHECK_P1: ffffeeeb2fa90069
BUGCHECK_P2: 10000084d010021
BUGCHECK_P3: ffffd70f82a6f440
BUGCHECK_P4: b
BLACKBOXBSD: 1 (!blackboxbsd)
BLACKBOXNTFS: 1 (!blackboxntfs)
BLACKBOXPNP: 1 (!blackboxpnp)
BLACKBOXWINLOGON: 1
PROCESS_NAME: csrss.exe
TRAP_FRAME: ffffd70f82a6f440 -- (.trap 0xffffd70f82a6f440)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=00000000ffffffff rbx=0000000000000000 rcx=ffffeeeb2fa90061
rdx=ffffeea342869620 rsi=0000000000000000 rdi=0000000000000000
rip=ffffeeeb2fa5a64e rsp=ffffd70f82a6f5d0 rbp=ffffeea3428a6968
r8=0000000000000000 r9=000000000000002f r10=fffff8005d926f90
r11=0000000000000000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei ng nz na pe nc
win32kbase!HMUnlockObjectWorker+0xe:
ffffeeeb
2fa5a64e f00fc14108 lock xadd dword ptr [rcx+8],eax ds:ffffeeeb
2fa90069=aff90d8bResetting default scope
STACK_TEXT:
ffffd70f
82a6f198 fffff800
5da4aca5 : 00000000000000be ffffeeeb
2fa90069 010000084d010021 ffffd70f
82a6f440 : nt!KeBugCheckExffffd70f
82a6f1a0 fffff800
5d89f550 : 0000000000000000 00000000
00000003 ffffd70f82a6f4c0 00000000
00000000 : nt!MiSystemFault+0x18d735ffffd70f
82a6f2a0 fffff800
5da05a5e : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!MmAccessFault+0x400ffffd70f
82a6f440 ffffeeeb
2fa5a64e : ffffeea342995174 00000000
00013c97 0000000000013c97 ffffeea3
42995188 : nt!KiPageFault+0x35effffd70f
82a6f5d0 ffffeeeb
2f40a974 : ffffeeeb2f40a9e2 ffffeeeb
2f40a9e2 ffff9e0d7b53c700 ffffeea3
42995188 : win32kbase!HMUnlockObjectWorker+0xeffffd70f
82a6f600 00000000
00000001 : 0000000000000004 00002000
00000000 ffffd70f82a6f7b0 ffffeeeb
2f40a546 : win32kfull!TimersProc+0x114ffffd70f
82a6f690 00000000
00000004 : 0000200000000000 ffffd70f
82a6f7b0 ffffeeeb2f40a546 00000000
00000000 : 0x1ffffd70f
82a6f698 00002000
00000000 : ffffd70f82a6f7b0 ffffeeeb
2f40a546 0000000000000000 00000000
000849c3 : 0x4ffffd70f
82a6f6a0 ffffd70f
82a6f7b0 : ffffeeeb2f40a546 00000000
00000000 00000000000849c3 00000000
00000001 : 0x0000200000000000
ffffd70f
82a6f6a8 ffffeeeb2f40a546 : 00000000
00000000 00000000000849c3 00000000
00000001 0000000000000004 : 0xffffd70f
82a6f7b0ffffd70f
82a6f6b0 ffffeeeb
2facfc14 : ffff9e0d76eef080 ffff9e0d
76eef080 0000000000000000 00000000
00000005 : win32kfull!RawInputThread+0x7f6ffffd70f
82a6f870 ffffeeeb
2f494a21 : ffff9e0d76eef080 00000000
00000000 0000000000000005 00000000
00000005 : win32kbase!xxxCreateSystemThreads+0xc4ffffd70f
82a6f9a0 ffffeeeb
2f35474e : ffff9e0d76eef080 ffff9e0d
76eef080 0000000000000000 00000000
00000000 : win32kfull!NtUserCallNoParam+0x71ffffd70f
82a6f9d0 fffff800
5da092b5 : ffff9e0d00000005 00000000
00000005 0000025f22a05280 00000000
00000408 : win32k!NtUserCallNoParam+0x16ffffd70f
82a6fa00 00007fff
4ff610e4 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : nt!KiSystemServiceCopyEnd+0x250000008a
38b3fc78 00000000
00000000 : 0000000000000000 00000000
00000000 0000000000000000 00000000
00000000 : 0x00007fff`4ff610e4SYMBOL_NAME: win32kbase!HMUnlockObjectWorker+e
MODULE_NAME: win32kbase
IMAGE_NAME: win32kbase.sys
STACK_COMMAND: .cxr; .ecxr ; kb
BUCKET_ID_FUNC_OFFSET: e
FAILURE_BUCKET_ID: AV_win32kbase!HMUnlockObjectWorker
OS_VERSION: 10.0.19041.1
BUILDLAB_STR: vb_release
OSPLATFORM_TYPE: x64
OSNAME: Windows 10
FAILURE_ID_HASH: {9e952ddc-0b7e-c566-dbb4-78c1e2cdd928}
Followup: MachineOwner